Results for Threat

Deloitte: For CyberSecurity – Offense Can Be the Best Defense

As 2016 begins, organizations are going on the offense to combat cyber threats, according to a report this month by Deloitte LLP.  Companies and government agencies are no longer satisfied with simply "locking the doors" where cybersecurity is concerned, said the 2016 Deloitte Analytics Trends report.

Full Story >

Survey: Ping Identity Finds Employee Behaviors Can Be Big Contributors To Security Risks

A recent survey of 1,000 employees at large U.S. enterprise organizations finds that employee inattentiveness, laziness and possible malicious intent add up to constitute a real cyber security concerns.  The research was commissioned by security vendor Ping Identity.

Full Story >

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

LogRhythm Extends Threat Analytics Suite with Endpoint Module

Security intelligence firm LogRhythm is looking to help IT more quickly detect intruders with its latest offering Endpoint Threat Analytics Module. It supplements LogRythm’s current threat analytics modules for network and end user visibility.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Survey: Consumers Have Big Concerns Over Security for Mobile Payment Platforms, Apps

Despite innovative mobile payments from giants Apple and Google, a recent survey finds practically everyone is worried about smartphone-based payment security.  Even credit cards weren’t the no-brainer choice, as more than 60% of U.S. respondents said cash is their Number One choice.  IDN looks at the Tripwire survey.

Full Story >

Arbor Networks To Protect Against BYOD, Mobile Vulnerabilities with Deep Analytics, Threat Protection

In the wake of surveys that find 60% of mobile network operators say they have come under attack. Arbor Networks Inc. has launched its Peakflow Mobile Network Analysis to give network service providers better visibility, including advanced threat protection for fixed networks, HSPA/LTE and cloud infrastructures.

Full Story >

Splunk Enhances Enterprise Security App with Threat Intelligent Framework, Visualizations

Splunk Inc. is shipping an update to its Splunk App for Enterprise Security, to help security professionals stalk cyberattackers. Splunk App for Enterprise Security 3.0 includes visualizations for better threat detection, a new threat intelligence framework, and support for new data types and data models.

Full Story >

Lookingglass Updates Cyber Security for Enterprise, Cloud

Cybersecurity company Lookingglass Cyber Solutions is shipping an alert and warning system to suppress threats and protect against network vulnerabilities to enterprise networks as well as to Internet-based connections to partners and providers.  The company’s Cyber-Heads-Up-Display (CyberHUD) works with Lookingglass’ appliance-based ScoutVision and cloud-based CloudScout products.

Full Story >

McAfee Outlines Security-as-a-Service Cloud Strategy

McAfee, Inc. has outlined details of its Security-as-a-Service strategy to deliver security products to corporations and end users as a service in the cloud. McAfee's move follows similar initiatives from Trend Micro, Symantec and Panda Security among others.

Full Story >

Avoid Top 5 Web Service Security Flaws

The "Top 5" threats list for web services notes that many vulnerabilities arise from some common practices -- including the use of open or standards-based technologies. Learn how XML parsing and WSDL publishing can open up your business to attacks, and get some expert tips for avoiding security holes.

Full Story >

<< Start < Previous 1 2 Next > End >>
Showing 1 - 12 of 14

Videos

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

When Bots Attack! Stopping OWASP's New Top 20 Automated Threats



  • Rami Essaid - CEO & Co-founder